Access Control
Rules
Access control rules are as important as the schemas for decentralized database. WeaveDB rules are extremely powerful using JsonLogic with an original add-on that enables JSON-based ramda functional programming.
Add rules
const rules = {
let: {
id: [
"join",
":",
[
{ var: "resource.newData.article_id" },
{ var: "resource.newData.user_address" },
],
],
},
"allow create": {
and: [
{ "!=": [{ var: "request.auth.signer" }, null] },
{
"==": [{ var: "resource.id" }, { var: "id" }],
},
{
"==": [
{ var: "request.auth.signer" },
{ var: "resource.newData.user_address" },
],
},
{
"==": [
{ var: "request.block.timestamp" },
{ var: "resource.newData.date" },
],
},
],
},
"allow delete": {
"!=": [
{ var: "request.auth.signer" },
{ var: "resource.newData.user_address" },
],
},
}
await db.setRules(rules, "bookmarks")
Within the rules object, each top level key defines one rule. A keys should be a combination of (allow
or deny
) and (write
, create
, update
, delete
).
allow write
is equivalent to allow create,update,delete
.
Preset Variables
You can access various data within the validation blocks.
const data = {
contract: { id, owners },
request: {
auth: { signer, relayer, jobID, extra },
block: { height, timestamp },
transaction: { id },
resource: { data },
id,
path,
},
resource: { data, setter, newData, id, path },
}
contract
id
: contractTxIdowners
: contract owners, equivalent togetOwner()
Request
auth
:signer
of the query, and relayer info (relayer
/jobID
/extra
)block
: block infotransaction
: transaction inforesource
:data
in the queryid
: doc idpath
: collection / doc path
Resource
data
: data before this querynewData
: data after this queryid
: doc idpath
: collection / doc pathsetter
: original creator of the doc
Modify Updated Data
You can amend the updated data before it's stored by modifying newData
in access control rules.
For example always add signer
address field as address
field.
const rules = {
let : { "resource.newData.address" : { var: "request.auth.signer" } },
"allow create" : true
}
await db.setRules(rules, "people", { ar : arweave_wallet })
If you set { name : "Bob"}
with wallet 0xABC
, the stored data will be { name : "Bob", address : "0xABC" }
.
await db.set({ name : "Bob" }, "people", "Bob")
expect(await db.get("people", "Bob")).to.eql({name : "Bob", address: "0xABC" }) // true
Add-on: JSON-based Functional Programming
Javascript functions cannot be passed and stored with Warp contracts. So WeaveDB invented a powerful & simple way to do functional programming using JSON objects. You can use most of the ramda functions, which enables highly complex logics for access controls and data validations.
Within the rules object, you can define variables under let
key and later use them within allow/deny
validation blocks.
const rules = {
let: {
id: [
"join",
":",
[
{ var: "resource.newData.article_id" },
{ var: "resource.newData.user_address" },
],
],
},
...
}
For example, above is equivalent to
const id = join(":", [ resource.newData.article_id, resource.newData.user_address ])
and later forcing doc ids to be article_id:user_address
with JsonLogic.
{
"==": [{ var: "resource.id" }, { var: "id" }],
}